Exploit:Java/CVE-2012-0507.Q!dr is a malicious Java class component that, in combination with
Exploit:Java/CVE-2012-0507.Q attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions of the
JRE up to and including the following are vulnerable to this exploit:
- Version 7 update 2
- Version 6 update 30
- Version 5 update 33
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start|Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
Make sure that you install all available updates from the vendor in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:
Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, but rather that an attempt to compromise your computer has been made.
Payload
Downloads and installs arbitrary files
If you visit a website containing the malicious code while using a vulnerable version of Java, Exploit:Java/ CVE-2012-0507.Q is loaded. It then attempts to download and execute files from a remote host/URL. The files that are downloaded and executed could be any of the attacker's choice and could include additional malware.
Additional technical details
In the wild, we have seen the following Java class files included in malicious Java archives:
-
sub.class
- detected as Exploit:Java/CVE-2012-0507.Q
-
tyu.class
- detected as Exploit:Java/CVE-2012-0507.Q
-
bvp.class
- detected as Exploit:Java/CVE-2012-0507.Q!ldr
-
ovm.class
- threat-related class
The malicious classes “
sub.class” and “
tyu.class” exploit the vulnerability described in
CVE-2012-0507. They call the function
doWork() inside the “
bvp.class” file to act as class loader. This vulnerability is associated with a flaw in the deserialization of "
AtomicReferenceArray" objects, which allows remote attackers to call, without proper "sandboxing", system level Java functions via the ClassLoader of a constructor that is being deserialized.
Analysis by Wei Li